Weekly analysis – 27th February 2010 to 6th March 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 27th February 2010 to 6th March 2010

Excerpted from:
Weekly analysis – 27th February 2010 to 6th March 2010

Share/Save/Bookmark

Hacking human gullibility with social penetration

No Comments

We don’t need no stinking exploits

Security penetration testers Mike Bailey and Mike Murray rely plenty on attacks that exploit weaknesses in websites and servers, but their approach is better summed up by the famous phrase “There’s a sucker born every minute.”…

Web threats: Why conventional protection doesn’t work

Excerpt from:
Hacking human gullibility with social penetration

Share/Save/Bookmark

Zombie tactics threaten to poison honeypots

No Comments

Hive minds vs bot herders

Innovations in botnet technology threaten the usefulness of honeypots, one of the main ways to study how bot herders control networks of zombie PCs.…

Offloading malware protection to the cloud

More here:
Zombie tactics threaten to poison honeypots

Share/Save/Bookmark

How to Install and Configure DKIM On Postfix With dkim-milter (2.8.x) on 64 bit CentOS 5

No Comments

The following document was written after countless hours of research and experimentation, in the hope that you will not have to waste as much time in setting up DKIM on Postfix as we had to. The documents in internet on this subject are mostly old and deals with an old version of DKIM Milter.

What is …. Source article

Share/Save/Bookmark

Weekly analysis – 20th February 2010 to 27th February 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 20th February 2010 to 27th February 2010

Originally posted here:
Weekly analysis – 20th February 2010 to 27th February 2010

Share/Save/Bookmark

Scareware scams ride the back of killer whale tragedy

No Comments

Black hats pee in the pool again

Supposed footage of Wednesday’s fatal Sea World killer whale attack in Florida actually points at sites distributing scareware.…

Web threats: Why conventional protection doesn’t work

Read more here:
Scareware scams ride the back of killer whale tragedy

Share/Save/Bookmark

Weekly analysis – 13th February 2010 to 20th February 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 13th February 2010 to 20th February 2010

See the rest here:
Weekly analysis – 13th February 2010 to 20th February 2010

Share/Save/Bookmark

Weekly analysis – 6th February 2010 to 13th February 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 6th February 2010 to 13th February 2010

Here is the original:
Weekly analysis – 6th February 2010 to 13th February 2010

Share/Save/Bookmark

Weekly analysis – 30th January 2010 to 6th February 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 30th January 2010 to 6th February 2010

Excerpt from:
Weekly analysis – 30th January 2010 to 6th February 2010

Share/Save/Bookmark

Facebook and Twitter are Popular among Hackers and Thieves

No Comments

  IT security firm Sophos revealed Monday in its Security Threat 2010  that Facebook and Tweeter are not only for social networker, it is extensively used by cybercriminals. The survey also said that spamming on social networking sites went up to 70%. 57% of the users said that they have been spammed through social networking …. Source

Share/Save/Bookmark

Older Entries